CYBER FRIDAY | JOHANNESBURG – TBA

SPEAKERS

SIMANGA RADEBE – Specialist – IT Security Analysis, ABSA Group

NETWORK ASSURANCE

Network assurance, is the method of validating whether services and policies configured on and across network appliances appropriately align with operational goals. Network configuration and telemetry data are collected and analyzed to assess network behavior and detect and recommend deviations from the operator’s original intent.

Network assurance helps to verify that configurations and running network services align with what the business requires as closely as possible. The result of this procedure is suggestions on how network equipment can be better configured.

The overall reason for network assurance is to ensure networks are running as optimally and securely as possible within specific business parameters. Failing to do so can result in situations where applications and services operating across the network fail to meet performance, network security, and usability expectations.

THULANI MABUZA – Cybersecurity Consultant: Team Lead | Head, Orange Cyberdefense

GUARDIANS OF PRIVACY: NAVIGATING THE TERRAIN OF DATA PROTECTION AGAINST INSIDER THREATS

This topic will delve into the dynamic realm of data protection and privacy. As the guardians of privacy, we’ll navigate the challenging terrain of safeguarding sensitive information against the ever-evolving landscape of insider threats. Explore strategies, real-world scenarios, and best practices to fortify your defenses and ensure the integrity of data in an age where privacy is paramount. This will be an opportunity to enhance understanding of insider threats and emerge as a vigilant guardian of privacy in the digital era.

DOMINIQUE DUSABEYEZU – Cybersecurity Architect, Microsoft

REDEFINING RESILIENCE: THE ART AND SCIENCE OF A CUTTING-EDGE SECURITY OPERATING MODEL

In the dynamic realm of digital innovation, the security landscape has evolved into a complex and unpredictable terrain. Adapting to this new reality necessitates organizations to move beyond traditional approaches, urging a fresh perspective on cybersecurity. Explore with us the captivating domain of “Redefining Resilience: The Art and Science of a Cutting-Edge Security Operating Model.”

This presentation explores the complex combination of art and science that is essential for a modern Security Operating Model (SOM). Instead of traditional methods, we look at the various elements that make up a strong cybersecurity strategy, revealing the power of creative thinking. Learn how to turn weaknesses into strengths and problems into opportunities through this inventive approach.

A Security Operating Model serves as the blueprint for establishing a resilient Security Operations Centre (SOC). It lays the foundation for your design, considering the threats at hand and the assets in need of protection. By aligning with your specific requirements, you can craft a framework that effectively addresses your unique security landscape.

OLUWASEYI AKILUDE – Cybersecurity Engineer, Dimension Data

PROTECTING AGAINST CYBER ATTACK WITH VULNERABILITY MANAGEMENT

In today’s digital world, cyberattacks are a constant threat to businesses and organizations of all sizes. Hackers are constantly evolving their tactics, exploiting vulnerabilities in systems and software to gain access to sensitive data and disrupt operations. To stay ahead of these threats, it’s crucial to implement a robust vulnerability management program.

WAYNE THERON – Manager Information Security, BankservAfrica

REGULATORY COMPLIANCE IN CYBERSECURITY

Practical steps to ensuring legislative and regulatory compliance and embedding the practices as business-as-usual in your organisation

  1. Legislative and Regulatory Landscape in RSA
  2. Cybersecurity Threats to Compliance
  3. Understanding your Business and its Compliance Regime
  4. Developing a Roadmap for the Implementation of the ICT Regulatory Framework
  5. Controls Selection – Statement of Applicability
  6. Criticality Assessment and Harm Reference Table
  7. Compliance Matrix in Policies, Standards and Procedures
  8. Compliance Certifications ( ISO 27001, PCI Data Security Standard, PCI Three Domain Security Standards (PCI 3DS), SWIFT Customer Security Controls Framework, SWIFT Provider Security Controls Framework )

TIMOTHY MAR – Senior Security Analyst, Sasol

ZERO TRUST SECURITY FRAMEWORK

A cyber security approach or model that considers all entities requiring access to organization network resources as untrusted and requires all entities to authenticate and be authorization before access network resources.

JEROEN KROON – Cybersecurity & Privacy advisor, SAP

DATA PRIVACY FROM A CSP PERSPECTIVE

SAP as one of the most important business cloud service providers in the world is dealing daily with data privacy. Not only in South Africa where the Popi act is active, but anywhere (Europe, USA, etc…) with local or regional privacy laws applies such as GDPR.

THUTHUKANI MBUYAZWE – Team Lead Infrastructure & Cyber Security, Blue Turtle Technologies

AI IN CYBERSECURITY/LEVERAGING ARTIFICIAL INTELLIGENCE FOR ENHANCED CYBERSECURITY

AI (Artificial Intelligence) plays a crucial role in cybersecurity, offering innovative solutions to counteract evolving threats in cyberspace. Overall, AI is a powerful tool in the cybersecurity arsenal, enabling organizations to stay ahead of cyber threats and protect their valuable assets more effectively.